Index: content/child/webcrypto/openssl/hkdf_openssl.cc |
diff --git a/content/child/webcrypto/openssl/hkdf_openssl.cc b/content/child/webcrypto/openssl/hkdf_openssl.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..cd294e57367513d0de7d1bdfae177f5ca8db8095 |
--- /dev/null |
+++ b/content/child/webcrypto/openssl/hkdf_openssl.cc |
@@ -0,0 +1,111 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include <openssl/err.h> |
+#include <openssl/hkdf.h> |
+ |
+// TODO: figure out which headers belong here and remove ones that were |
eroman
2014/12/23 23:13:36
(1) TODO(nharper)
(2) Address the TODO now :)
nharper
2015/01/06 22:53:42
Done.
|
+// just copied over from hmac |
+#include "base/logging.h" |
+#include "base/stl_util.h" |
+#include "content/child/webcrypto/algorithm_implementation.h" |
+#include "content/child/webcrypto/crypto_data.h" |
+#include "content/child/webcrypto/jwk.h" |
+#include "content/child/webcrypto/openssl/key_openssl.h" |
+#include "content/child/webcrypto/openssl/sym_key_openssl.h" |
+#include "content/child/webcrypto/openssl/util_openssl.h" |
+#include "content/child/webcrypto/status.h" |
+#include "content/child/webcrypto/webcrypto_util.h" |
+#include "crypto/openssl_util.h" |
+#include "crypto/secure_util.h" |
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" |
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
+ |
+namespace content { |
+ |
+namespace webcrypto { |
+ |
+namespace { |
+ |
+const blink::WebCryptoKeyUsageMask kValidUsages = |
+ blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits; |
+ |
+class HkdfImplementation : public AlgorithmImplementation { |
+ public: |
+ HkdfImplementation() {} |
+ |
+ // This is doing a check that is only valid for raw format, but since |
+ // ImportKeyRaw is the the only ImportKey implemented here, there's no |
+ // need to check the format here. |
eroman
2014/12/23 23:13:36
You should do the check, otherwise this is inconsi
nharper
2015/01/06 22:53:42
I added a check here for this. It turns out in bot
|
+ Status VerifyKeyUsagesBeforeImportKey( |
+ blink::WebCryptoKeyFormat format, |
+ blink::WebCryptoKeyUsageMask usages) const override { |
+ return CheckKeyCreationUsages(kValidUsages, usages, false); |
+ } |
+ |
eroman
2014/12/23 23:13:36
This also needs support for cloning/de-cloning.
nharper
2015/01/06 22:53:42
Done.
|
+ Status ImportKeyRaw(const CryptoData& key_data, |
+ const blink::WebCryptoAlgorithm& algorithm, |
+ bool extractable, |
+ blink::WebCryptoKeyUsageMask usages, |
+ blink::WebCryptoKey* key) const override { |
+ *key = blink::WebCryptoKey::create( |
+ new SymKeyOpenSsl(key_data), blink::WebCryptoKeyTypeSecret, extractable, |
+ blink::WebCryptoKeyAlgorithm::createHkdf(), usages); |
+ return Status::Success(); |
+ } |
+ |
+ Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm, |
+ const blink::WebCryptoKey& base_key, |
+ bool has_optional_length_bits, |
+ unsigned int optional_length_bits, |
+ std::vector<uint8_t>* derived_bytes) const override { |
+ // When called by crypto.subtle.deriveBits(), length will already be present |
+ // and converted to a number. It won't be called as part of deriveKey, |
eroman
2014/12/23 23:13:36
I don't understand this comment. HKDF does support
nharper
2015/01/06 22:53:42
Done.
|
+ // because that's not supported for this algorithm. Therefore, it's |
+ // unexpected for this method to ever be called without a length. |
+ if (!has_optional_length_bits) |
+ return Status::ErrorUnexpected(); |
+ |
+ // "If the hash member of normalizedAlgorithm does not describe a recognized |
+ // algorithm that supports the digest operation, then throw a |
+ // NotSupportedError" |
+ const EVP_MD* digest_algorithm = |
+ GetDigest(algorithm.hkdfParams()->hash().id()); |
eroman
2014/12/23 23:13:36
It is guaranteed to already be a digest, since the
nharper
2015/01/06 22:53:42
This same check is done in the HMAC code - any obj
eroman
2015/01/07 00:23:42
Nope. Although we should be consistent about when
nharper
2015/01/08 01:31:23
It looks like sha_openssl.cc is the only one (code
|
+ if (!digest_algorithm) |
+ return Status::ErrorUnsupported(); |
+ |
+ // Size output to fit length |
+ unsigned int derived_bytes_len = (optional_length_bits + 7) / 8; |
eroman
2014/12/23 23:13:36
Use NumBitsToBytes() instead.
It is more readable
nharper
2015/01/06 22:53:42
Done.
|
+ derived_bytes->resize(derived_bytes_len); |
+ |
+ // Algorithm dispatch checks that the algorithm in |base_key| matches |
+ // |algorithm|. |
+ std::vector<uint8_t> raw_key = |
eroman
2014/12/23 23:13:36
Don't make a copy of the key material.
nharper
2015/01/06 22:53:42
Done.
|
+ SymKeyOpenSsl::Cast(base_key)->raw_key_data(); |
+ blink::WebVector<unsigned char> salt = algorithm.hkdfParams()->salt(); |
eroman
2014/12/23 23:13:36
Don't make copies here.
nharper
2015/01/06 22:53:42
Done.
|
+ blink::WebVector<unsigned char> info = algorithm.hkdfParams()->info(); |
+ if (!HKDF(derived_bytes->data(), derived_bytes_len, digest_algorithm, |
+ raw_key.data(), raw_key.size(), salt.data(), salt.size(), |
+ info.data(), info.size())) { |
+ uint32_t error = ERR_get_error(); |
+ if (ERR_GET_LIB(error) == ERR_LIB_HKDF && |
+ ERR_GET_REASON(error) == HKDF_R_OUTPUT_TOO_LARGE) { |
+ return Status::ErrorHkdfLengthTooLong(); |
+ } else { |
eroman
2014/12/23 23:13:36
nit: omit "else" when short-circuiting.
nharper
2015/01/06 22:53:42
Done. Also removed the curly braces from the one-l
|
+ return Status::OperationError(); |
+ } |
+ } |
+ return Status::Success(); |
+ } |
+}; |
+ |
+} // namespace |
+ |
+AlgorithmImplementation* CreatePlatformHkdfImplementation() { |
+ return new HkdfImplementation; |
+} |
+ |
+} // namespace webcrypto |
+ |
+} // namespace content |